Searched refs:digest (Results 1 - 25 of 78) sorted by relevance

1234

/osnet-11/usr/src/lib/libsip/common/
H A Dsip_hash.h41 #define SIP_DIGEST_TO_HASH(digest) \
42 ((digest[0] + digest[1] + digest[2] + digest[3] + digest[4] + \
43 digest[5] + digest[6] + digest[7]) % SIP_HASH_SZ)
H A Dsip_hash.c40 * the caller provides the hash table, the digest (opaque), the index into
42 * for removing an object, the caller provides the hash table, the digest
82 * Given the hash table, the digest to be searched for, index into the hash
87 sip_hash_find(sip_hash_t *sip_hash, void *digest, int hindex, argument
98 if (match_func(tmp->sip_obj, digest)) {
135 * Given the hash table, the digest to be searched for, the index into the
140 sip_hash_delete(sip_hash_t *sip_hash, void *digest, int hindex, argument
152 if (del_func(tmp->sip_obj, digest, &found)) {
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/t/
H A Ddigest.t15 is $d->digest, "ooo";
18 is $d->digest, "ooo";
22 is $d->digest, "24";
H A Dbase.t23 sub digest {
33 is($ctx->digest, "X0000");
46 is($ctx->digest, "f0003");
64 is($ctx->digest, "a0301");
72 is($ctx->digest, "U0001");
80 is($ctx->digest, "a0002");
83 is($ctx->digest, "a0003");
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDigestUtil.c49 * context, then calls the corresponding software provided digest
66 session_p->digest.context = malloc(sizeof (MD5_CTX));
68 if (session_p->digest.context == NULL) {
73 session_p->digest.mech.mechanism = CKM_MD5;
76 MD5Init((MD5_CTX *)session_p->digest.context);
84 session_p->digest.context = malloc(sizeof (SHA1_CTX));
86 if (session_p->digest.context == NULL) {
91 session_p->digest.mech.mechanism = CKM_SHA_1;
92 session_p->digest.mech.pParameter = pMechanism->pParameter;
93 session_p->digest
[all...]
H A DsoftSessionUtil.c357 if (session_p->digest.context != NULL)
358 free(session_p->digest.context);
467 /* Check to see if digest operation is active. */
468 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) {
472 switch (session_p->digest.mech.mechanism) {
511 &session_p->digest,
514 switch (session_p->digest.mech.mechanism) {
516 /* Save MD5_CTX for the active digest operation */
520 session_p->digest.context,
525 /* Save SHA1_CTX for the active digest operatio
[all...]
H A DsoftDigest.c60 /* Check to see if digest operation is already active */
61 if (session_p->digest.flags & CRYPTO_OPERATION_ACTIVE) {
64 * digest.context is only a flat structure.
72 * the message digest.
74 session_p->digest.flags = CRYPTO_OPERATION_ACTIVE;
82 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE;
132 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
146 if (session_p->digest.flags & CRYPTO_OPERATION_UPDATE) {
149 * operation, so we'll leave the active digest operation
151 * digest updat
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelDigest.c73 * the message digest.
75 session_p->digest.flags |= CRYPTO_OPERATION_ACTIVE;
78 session_p->digest.mech.mechanism = pMechanism->mechanism;
79 session_p->digest.mech.pParameter = NULL;
80 session_p->digest.mech.ulParameterLen = 0;
81 session_p->digest.flags |= CRYPTO_EMULATE;
115 session_p->digest.flags &= ~CRYPTO_OPERATION_ACTIVE;
146 crypto_digest_t digest; local
170 if (!(session_p->digest.flags & CRYPTO_OPERATION_ACTIVE)) {
184 if (session_p->digest
[all...]
/osnet-11/usr/src/lib/crypt_modules/sunmd5/
H A Dsunmd5.c95 md5bit(uint8_t *digest, int bit_num) argument
104 /* return the value of bit N from the digest */
105 return ((digest[byte_off] & (0x01 << bit_off)) ? 1 : 0);
259 uint8_t digest[DIGEST_LEN]; /* where the MD5 digest is stored */ member in struct:__anon951
268 int indirect_a; /* 7bit index into digest */
271 int indirect_b; /* 7bit index into digest */
317 /* compute the digest */
319 MD5Final(data.digest, &data.context);
331 /* update with the previous digest */
[all...]
/osnet-11/usr/src/lib/libldap4/include/
H A Dsec.h20 int key_len, unsigned char *digest);
/osnet-11/usr/src/lib/libldap4/sec/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
18 buffer (min 16 chars) which will contain the resulting digest */
20 int key_len, unsigned char *digest)
52 (void) MD5Final(digest, &context);
57 (void) MD5Update(&context, digest, 16);
59 (void) MD5Final(digest, &context);
19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
/osnet-11/usr/src/lib/libldap5/include/ldap/
H A Dsec.h10 int key_len, unsigned char *digest);
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/t/lib/Digest/
H A DDummy.pm17 sub digest { shift->{d} } subroutine
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dcram_md5.c17 /* text is the challenge, key is the password, digest is an allocated
18 buffer (min 16 chars) which will contain the resulting digest */
20 int key_len, unsigned char *digest)
52 (void) MD5Final(digest, &context);
57 (void) MD5Update(&context, digest, 16);
59 (void) MD5Final(digest, &context);
74 unsigned char digest[16]; local
81 bzero(digest, sizeof (digest));
94 (unsigned char *)cred->bv_val, cred->bv_len, digest);
19 hmac_md5(unsigned char *text, int text_len, unsigned char *key, int key_len, unsigned char *digest) argument
[all...]
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/
H A Dhash-common.c32 /* Run a selftest for hash algorithm ALGO. If the resulting digest
51 unsigned char *digest; local
54 return "digest size does not match expected size";
84 digest = _gcry_md_read (hd, algo);
86 if ( memcmp (digest, expect, expectlen) )
87 result = "digest mismatch";
H A Dmd.c1 /* md.c - message digest dispatcher
39 /* This is the list of the digest implementations included in
43 gcry_md_spec_t *digest; member in struct:digest_table_entry
110 gcry_md_spec_t *digest; member in struct:gcry_md_list
177 for (i = 0; !err && digest_table[i].digest; i++)
190 (void *) digest_table[i].digest,
203 gcry_md_spec_t *digest = (gcry_md_spec_t *) spec; local
206 return (! stricmp (digest->name, name));
213 gcry_md_spec_t *digest = (gcry_md_spec_t *) spec; local
215 gcry_md_oid_spec_t *oid_specs = digest
232 gcry_module_t digest; local
244 gcry_module_t digest; local
256 _gcry_md_register(gcry_md_spec_t *digest, md_extra_spec_t *extraspec, unsigned int *algorithm_id, gcry_module_t *module) argument
308 gcry_md_spec_t *digest = module->spec; local
332 gcry_module_t digest; local
370 gcry_module_t digest; local
404 gcry_module_t digest; local
544 gcry_md_spec_t *digest = NULL; local
1005 gcry_md_hash_buffer(int algo, void *digest, const void *buffer, size_t length) argument
1067 gcry_module_t digest; local
1101 gcry_module_t digest; local
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/Digest/
H A Dbase.pm11 sub digest;
56 return unpack("H*", $self->digest(@_));
62 my $b64 = MIME::Base64::encode($self->digest(@_), "");
84 C<hexdigest> and C<b64digest> in terms of C<digest>.
87 this implementations of the alternative I<add> and I<digest> methods.
93 digest
H A Dfile.pm17 croak("No digest algorithm specified") unless @_;
28 digest_file_ctx(@_)->digest;
57 This module provide 3 convenience functions to calculate the digest
64 This function will calculate and return the binary digest of the bytes
74 Same as digest_file(), but return the digest in hex form.
78 Same as digest_file(), but return the digest as a base64 encoded
/osnet-11/usr/src/lib/libsasl/include/
H A Dhmac-md5.h34 * digest may be same as text or key
38 unsigned char digest[HMAC_MD5_SIZE]);
58 void _sasl_hmac_md5_final(unsigned char digest[HMAC_MD5_SIZE],
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/crypto/
H A Dmd5.h54 unsigned char digest[16]; /* actual digest after MD5Final call */ member in struct:__anon1004
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/lib/
H A DDigest.pm80 or "hashes", of some data, called a message. The digest is (usually)
81 some small/fixed size string. The actual size of the digest depend of
85 An important property of the digest algorithms is that the digest is
87 property is that digest functions are one-way functions, that is it
89 digest. Algorithms differ in how "likely" and how "hard", as well as
95 digest for a different message it is wise to make it easy to plug in
104 The digest can be delivered in three formats:
120 representation of the digest with any trailing padding removed. The
129 return the digest
[all...]
/osnet-11/usr/src/cmd/perl/5.8.4/distrib/ext/Digest/MD5/
H A DMD5.pm58 $digest = md5($data);
59 $digest = md5_hex($data);
60 $digest = md5_base64($data);
70 $digest = $ctx->digest;
71 $digest = $ctx->hexdigest;
72 $digest = $ctx->b64digest;
79 output a 128-bit "fingerprint" or "message digest" of the input.
94 This function will concatenate all arguments, calculate the MD5 digest
103 Same as md5(), but will return the digest i
[all...]
/osnet-11/usr/src/grub/grub-0.97/stage2/
H A Dmd5.c215 unsigned char *digest; local
241 digest = md5_final ();
242 memcpy (alt_result, digest, 16);
254 digest = md5_final ();
258 memcpy (alt_result, digest, 16);
277 digest = md5_final ();
284 digest[i == 4 ? 5 : 12+i] | (digest[6+i] << 8) | (digest[i] << 16);
301 unsigned int w = digest[1
339 unsigned char* digest = md5 (buffer); local
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/arcfour/
H A Darcfour_str2key.c60 memcpy(key->contents, md4_context.digest, 16);
68 printf("%02x", md4_context.digest[counter]);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/keyhash_provider/
H A Dhmac_md5.c53 char digest[MD5_CKSUM_LENGTH]; local
62 * Solaris Kerberos: The digest length is that of MD5_CKSUM_LENGTH not the key
63 * length, as keys can be of varying lengths but should not affect the digest
64 * length. The signing key is the digest and therefore is also the same
110 (CK_BYTE_PTR)digest, (CK_ULONG_PTR)&hashlen)) != CKR_OK) {
115 md5tmp.data = digest;

Completed in 33 milliseconds

1234